Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
The EDUCAUSE/Internet2 Higher Education Information Security Council (HEISC) works to improve information security, data protection, and privacy programs across the higher education sector through its volunteers and focused partnerships with government, industry and other academic organizations.
New to Your Security Role?
If you are a new CISO or new to the higher education community, we recommend checking out the Toolkit for New CISOs, a resource developed by members of the Higher Education Information Security Council.
Information Security Guide: Effective Practices and Solutions for Higher Education
The Information Security Guide: Effective Practices and Solutions for Higher Education is now available in wiki format. This resource provides practical approaches to preventing, detecting, and responding to security problems in a wide range of higher education environments. This online service is designed with colleges and universities in mind, balancing our need for security with the need for an open, collaborative networking environment. Also, because one of the overarching concerns in college and university information technology (IT) departments is a lack of resources, an effort is made to provide low-cost solutions. The target audiences are those responsible for information security in colleges and universities and information technology staff who implement and manage security measures. Recognizing that many institutions have initiated or are in the process of developing IT security programs and policies, an effort is made throughout this resource to present practices that are useful at each stage of the developmental process.
As a community-driven, community-serving project, it is important for this initiative to incorporate experiences and perspectives from many different institutions. To contribute case studies that have been effective in your institution, please contact email@example.com.
Library Items on this Topic
EDUCAUSE Library Items for Cybersecurity
- Lions and Tigers and Mobile Devices: Removing the Fear Factor from Securing Smart Devices
May 17, 2012
A session at the Security Professionals Conference 2012
The dramatic increase of smart devices across campus has presented security professionals with some interesting opportunities and challenges. Two Texas state institutions will review where they are…
- Responsible Computing: A Handbook for Faculty and Staff
November 28, 2011
This online Handbook is an attempt to produce a responsible computing manual for faculty and staff and many of the policies listed within are under review or subject to change based on interpret…
- Virginia Tech Change Your Password Policy
July 22, 2011
This is the Virginia Tech page on the importance of changing your password, including information on how to do it. This is the Virginia Tech pa…
- Tips for Safe and Secure Social Networking
August 23, 2010
This Higher Education Information Security Council resource includes US-CERT recommendations and suggested steps to use social networking in a safe and secure environment. …
January 4, 2010
This a web site concerning all things computer security at Virginia Tech. Includes information on University Policies & Guidelines, links to tools and sites that will help you analyze risks, …
- Top 10 Threats to Computer Systems Include Professors and Students
December 17, 2008
College network security staff are findign the weakest part of a campus network is the users, including professors and students, who carelessly give out their passwords or leave important informa…
- Security Metrics: A Solution in Search of a Problem
August 4, 2008
© 2008 Joel Rosenblatt. The text of this article is licensed under the Creative Commons Attribution-Share Alike 3.0 license ( http://creativecommons.org/licenses/by-sa/3.0/ ). EDUCAUSE Qu…
- Developing a University Systemwide Information Security Roadmap
April 11, 2007
A session at the Security 2007
Developing and implementing a common set of baseline information security practices across all the campuses of a very large state university system can be a daunting undertaking. This presentation …
- Seminar 3P - A Blueprint for Handling Sensitive Data: Security, Privacy, and Other Considerations PLEASE NOTE: Separate registration and fee are required to attend this seminar.
March 19, 2007
A session at the NERCOMP Annual Conference 2007
Information security risks at colleges and universities present challenging legal, policy, technical, and operational issues. According to a recent study by the EDUCAUSE Center for Analysis and Re…
- A Blueprint for Handling Sensitive Data: Security, Privacy, and Other Considerations
January 1, 2007
Information security risks at colleges and universities present challenging legal, policy, technical, and operational issues. According to a recent study by the EDUCAUSE Center for Analysis and Res…